Volume- 3
Issue- 3
Year- 2015
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Dr Isa Ali Ibrahim , I. B. Mohammed, Bashir Saidu
With fraud perpetrators becoming more sophisticated both in their techniques and the tools they use, fraud is an increasing problem. Telecommunications service providers are currently second only to banks in losing money through fraud. Investments in an integrated fraud management system pay off quickly even for operators of small networks. However, telecommunication fraud has been a major challenge to the growth of the industry. Different solutions and services have been employed to curb this menace in the mobile industry, but the more advanced the service or solution, the more susceptible it is to fraud. This study therefore presents a survey on the Critical Analysis of Significance of Fraud Management System in Detecting Fraud in Cellular Telephone Network in NIGERIA. A major services provided by Nigeria’s mobile telecommunication company over a specified period of time and proffer suitable solutions to reduce fraud in this industry in order to restore the telecommunication subscriber’s confidence in their mobile operators. A descriptive survey design was used. using convenient sampling technique (i.e. non-probability). The respondents were staff and management of GLOBACOM. Measurements of the study were done and subjected to rigorous data processing and analysis using simple percentage through relevant statistics computer software package called statistical package for social science (IBM-SPSS version 20.0), average mean and standard deviation was also used to determine the final justification regarding the research study under review. The findings of the research work revealed Fraud Management System (FMS) plays significance roles in detecting fraud in GSM industry. The study recommends that a longitudinal study to be carried out, so as to study the factual nature and quality of fraud management system in detecting fraud cellular telephone network in Nigeria’s GSM industry.
[1] ACFE. (2006). The report to the nation on the occupational fraud and abuse, technical report. Association for financial prepositional, payment fraud survey, report of survey result, underwritten by electronic payments network. Retrieved on 26 July 2014, from http://www.afponline.org/pub/pdf/2007PaymentsFraudSurvey.pdf.
[2] Agrawal, A P. (2010).Telecom fraud management. Retrieved on 26 July 2014, from http://www.cerebralbusiness.com/telecom/presentations/Arpita%20Pal %20Agrawal.pdf,
[3] Akhter, M., I., Ahamad, M., G. (2012). Detecting Telecommunication Fraud using Neural Networks through Data Mining. International Journal of Scientific & Engineering Research, Volume 3, Issue 3.
[4] Allen, L. (2010). Fraud and social engineering in community bank, information security trends and strategies. Retrieved on 26 July 2014, from http://www.larsonallen.com/Advisory_Services/Fraud_and_Social_Eng ineering_in_Community_Banks.aspx
[5] Anonymous. (2003). Who commit fraud and why. Retrieved on 26 July 2014, from http://www.swlearning.com/pdfs/chapter/053872689X_2.PDF.
[6] Apri.(2004).Experience of fighting telecommunication fraud. Retrieved on 26 July 2014, http://www.nadaaapri.org/pdf/sounds tppgood.pdf
[7] A&T. (2009). Business subscription and equipment fraud prevention. Retrieved on 26 July 2014, from http://www.atlantacellular.com/posdotcom.
[8] Baker, T. (2008). Anti – fraud management survey results, magnify your anti fraud managemen. Retrieved on 12 July 2014, from http://www.bakertilly.com/cms/public.
[9] Banjoko, A. (2009). Using the circle of trust to enhance fraud management in developing markets, GRAPA. Retrieved on 26 July 2014, from www.telecom-fraud.org,
[10]Bavosa, A. ( 2004). GPRS Security threats and solution recommendations. Juniper network, white paper. Retrieved on 26 July 2014, from http://stools1. juniper.net/solutions/literature/ white_papers/200074.
[11] B/OSS. (2004).Telecom fraud on raise. Retrieved on 26 July 2014, from http://www.billingworld.com/articles/2004/07/telecom-fraud-on-the-rise .aspx.
[12] B/OSS. (2007).Top telecom fraud and how to stop them. Retrieved on 26 July 2014, from :http://www.billingworld.com/articles2007/01/top-telco-frauds-and-how -tostop- them.aspx ,
[13] Business issue. (2009). Credit risk and bad debit, understanding receivables management problems and solutionsfor telecommunication , media and entertainment sector. Retrieved on 26 July 2014, from http://www.scribd.com/doc/28155799/Credit-Risk-and-Bad-Debt-in-Te lecommunications,
[14] Brown, S. (2005). Telecommunication fraud management. Retrieved on 26 July 2014, from http://waveroad.ca/ressources/Whitepaper_SB_Janvier2005.pdf.
[15]Brown, D. (2005). Southern African network an application conference. Retrieved on 12 June 2014, from http://mo.co.za/open/ngnfms.pdf.
[16] CFCA. (2009). Communication fraud control association results of worldwide telecom fraud survey. Retrieved on 26 July 2014, from http://www.cfca.org/pdf/survey/2009%20Global%20Fraud%20Loss%2 0Survey Press%20Release.pdf
[17]CFCA. (2006). Communication fraud control association results of worldwide telecom fraud survey. Retrieved on 14 July 2014, from http://www.cfca.org/pdf/press/3-28-06PR.pdf,
[18] Churchill H.(1995). General and Industrial Management, Pitman and Sons Press, London.
[19] Federal register. (2008 ). Department of labor, Employment standard and administration wages and hour division. vol.73.no.28. Retrieved on 26 July 2014, from http://www.dol.gov/whd/fmla/FedRegNPRM.pdf.
[20] Field, A.P. (2005). Discovering Statistics Using SPSS, 2nd Edition, London, Sage.
[21] FSA. (2006). Financial service authority, firms high –level management of fraud risk. Retrieved on 26 July 2014,from http://www.fsa.gov.uk/pubs/other/fraud_risk.pdf
[22] Goliath. (2004).Why customer churn. Retrieved on 26 July 2014, from http://goliath.ecnext.com/coms2/gi_0198-373341/4-Why-customersch urn.Html.
[23] Gonzalez-Castano, F.J., Vales-Alonso J., Pousada- Carballo, J.M. de Vicente, F.I.
[24] Fernandez-Iglesias, M.J., Taylor F. (2009), “Real-Time Interception Systems for the GSM Protocol,” IEEE Transactions on Vehicular Technology, Vol.51, No.5, (pp. 904-914).
[25] Grandhi, S. (2010). Application of data mining to credit card fraud. Retrieved on 26 July 2014, from http://www.sas.com/offices.
[26] Grant, T. (2010).Trust and occupational fraud, how to trust is just as important as who to trust. white paper. Retrieved on 26 July 2014, from http://www.grantthornton.ca/resources/insights/white_papers/Trust_an d_occupational_fraud_2010_electronic.pdf,
[27] Graycar, A., Smith, R. (2002). Identifying and Responding to Electronic fraud Risk. Australian institute of Criminology, proceeding of the 30th Australian Registers conference Canbera Retrieved on 26 July 2014, from
[28] GSM Association. (2008). Mobile Roaming Service in Latin America, Market &technical approach .IIRSA Workshop .Bogota, Colombia. Retrieved on 21 July 2014, from http://www.iirsa.org/BancoMedios/Documentos%20PDF/tir_bo gota08_medidas_tecnicas.pdf.
[29] Hoath, P. (2008). Fraud overview, TAF regional seminar on cost and tariffs. Retrieved on 26 July 2014, from http://www.itu.int/ITU-D/finance/work-cost-tariffs/events/tariff-s eminars/djibouti-08/Peter%20Hoath-4-EN.PDF.
[30] Heerde, J H V. (2005). Detecting fraud in cellular telephone network. M S Theses. University of Stellenbosch ,south Africa. Retrieved on 10 July 2014, from http://dip.sun.ac.za/~vuuren/Theses/vanHeerden.pdf.
[31] Hollmen, J. (2000). User profiling and classification for fraud detection in mobile communication networks. M S. Thesis. Helsinki university of technology. Retrieved on 26 July 2014, from http://citeseerx.ist.psu.edu/viewdoc.
[32] Johnson, M. (2002). Future fraud, telecom fraud in the next generation service. Retrieved on 26 July 2014, from http://www.oct.ict.org/index.php?dir=4
[33] Johnson, M. (2002). Revenues assurance, fraud &security in 3G service. Journal of economics and crime. vol 1 issue 2, Retrieved on 26 July 2014, from http://www.utica.edu/academic/institutes/ecii/publications/articl es/BA2A7651-0488-
[34] Katzs, N. (2010 ). Protect again procurement fraud, Inside supply management.vol .21,No.3, page 16 Retrieved on 14 June 2014, from http://www.supplychainfraud.com
[35] KPMG. (2006). India fraud survey report. Retrieved on 12 August 2014, from http://www.in.kpmg.com/TL_Files/Pictures/Fraud_Survey_New .pdf ,
[36] KPMG. (2009). Revenue assurance in telecommunication progressing and preserving, global revenue assurance survey results. Retrieved on 26 July 2014, from http://www.kpmg.com/Global/en
[37] Krenker, A. Volk, M. Sedlar, U. Bester, J. & Kos, A. (2009). Bidirectional Artificial Neural Network For Mobile Phone Fraud Detection. Retrieved on 26 July 2014, from http://www.ltfe.org/wpcontent/
[38] Kroll. (2010). The Downturn and Fraud, your sector may even be better off. Retrieved on 14 Agust 2014, from http://www.kroll.com/about/library/fraud
[39] Kumar, M. Grifinkel, T. Bonen, D. Winorad T. (2010). Reducing shoulder surfing by using gaze-password entry. Stanford University. Retrieved on 26 July 2014, from http://www.stanford.edu.
[40] kumar, R. (2010). Fraud management system-selection and retuning ,unior. Retrieved on 26 July 2014, from http://www.cerebralbusiness.com/telecom. [41] National fraud authority. (2010). Annual fraud indicator. Retrieved on 26 July 2014, from http://www.attorneygeneral.gov.uk/nfa/GuidetoInformation/Doc uments. [42] Nelsson, O. (2009).Subscription fraud in telecommunication using detection tree learning. M .S. Thesis .Maker ere University. Retrieved on 26 July 2014, from http://dspace.mak.ac.ug/bitstream.
[43] Ogundile, O. (|2013). Fraud Analysis in Nigeria’s Mobile Telecommunication Industry. International Journal of Scientific and Research Publications, Volume 3, Issue 2.
[44] Pieprzyk, J. Ghodosi, H. & Dawson, E. (2007). Information security and privacy: 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007: proceedings, Springer, Germany, pp 446-447.
[45] Robert, R. Dabija, D. (2009). Telecom fraud management training course. Retrieved on 26 July 2014, from Praesidium,Qtel.
[46] Samarati, P. (2010). Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings, Springer, USA, pp 201.
[47] Shelton, R. (2003). The Global Battle against Telecommunication Fraud. Retrieved on 17 June 2014, from www.satnac.org.za/proceedings/2003/plenary/Shelton.pdf ,.
[48] Srinivas, S. (2001) "The GSM standard-An overview of it security” Sans Institute information Science Reading room, (Pp3), Retrieved June 21st , 2014. http;//www.isaac.csBerkeley-Edd- Edu/lsaac/gsm.html.
[49] Wilhelm, K., W. (2004). The fraud management life cycle theory, Holistic Approach to fraud management. Journal of economic crime management .Vol. 2,Issue2. Retrieved on 27 August 2014, from http://www.utica.edu/academic
[50] Yates, C. (2003). Mobile phone issues-what risks associated with their use by our youth. Retrieved on 08 July 2014, from http://www.netsafe.org.nz/DocLibrary/netsafe papers colinyates_mobile.pdf.
Assistant Professor, Faculty of Computer Science and Information Systems Islamic University of Madinah, 42351, Kingdom of Saudi Arabia
No. of Downloads: 6 | No. of Views: 1084
Vikas K. Yeotikar, Manish T. Wanjari.
July 2015 - Vol 3, Issue 4
Anindita Kundu, ..
March 2015 - Vol 3, Issue 2
Anjula Balmiki, Sarsij Tripathi.
November 2014 - Vol 2, Issue 6